|
You are here |
tomverbeure.github.io | ||
| | | | |
www.malwaretech.com
|
|
| | | | | "Discovery requires experimentation" | |
| | | | |
8051enthusiast.github.io
|
|
| | | | | [AI summary] The article provides an in-depth analysis of the firmware of a laptop's Realtek WiFi chip (rtl8821ae), exploring its architecture, communication protocols, and the RealWoW technology used for wake-on-wifi. It also discusses the possibility of creating a keylogger by leveraging the EC (Embedded Controller) and WiFi firmware interactions. The content includes insights into the 8051-based firmware structure, memory-mapped communication, and reverse engineering efforts to understand and modify the firmware. | |
| | | | |
www.shogunlab.com
|
|
| | | | | Welcome to the second part in a tutorial series on reverse engineering Windows binaries with Ghidra! In this post, we'll be building on the concepts we learned in Part 0 and introduce some new topics | |
| | | | |
gist.github.com
|
|
| | | GitHub Gist: instantly share code, notes, and snippets. | ||